Cleared Employee Reporting Requirements. Reporting Regulations  Defense Security Service (DSS)  The National Industrial Security Program Operating Manual(NISPOM)1-300.

Slides:



Advertisements
Similar presentations
Adverse Information Adverse Information:
Advertisements

Personnel Background Investigations. Introduction The interests of the national security require that all persons privileged to be employed in the departments.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
How to Obtain and Keep a Security Clearance?. What Is A Security Clearance? A determination made by the government that you are stable and trustworthy,
Confidentiality and HIPAA
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Legal and Ethical Issues. 1. Describe and explain legal and ethical issues. 2. Describe guidelines for avoiding legal action and list methods for protecting.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
Safeguarding Adults in Bath & North East Somerset Awareness Session
An introduction to Child Protection and Safeguarding
A Combat Support Agency 11 Tim Sullivan Chief of Security Defense Information Systems Agency 7 May 2009 Security Clearances A Combat Support Agency Defense.
Special Category Cases. Special Categories  Military Whistleblower Reprisal  Senior Officials  Civilian Reprisal  Equal Opportunity  Equal Employment.
Special Category Cases. Special Categories  Military Whistleblower Reprisal  Senior Officials  Civilian Reprisal  Equal Opportunity  Equal Employment.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
John E. Reid and Associates, Inc..  The CEA is an interactive software program that interviews job applicants for your organization  It is not a static.
ICT Ethics 2 ICT 139.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
ABUSE1 Elder Abuse, Neglect and Exploitation Training for Professionals Please Sign In.
Successful Solutions Professional Development LLC A Basic Approach to Child Safety Chapter 4 Mandated Reporting Law.
Espionage Indicators Briefing 1 U.S. Department of Commerce
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Joe Jessop & Jackie Spurlock. Adverse Information Any information that adversely reflects on the integrity or character of a cleared employee, that suggests.
1 Overview of Ethics Requirements for Employees of Montgomery County This is a summary to help identify issues; it is not the law. Please address ethics.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
FERPA: Family Educational Rights and Privacy Act.
Section II: Law Enforcement
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
Security Debriefing. Introduction You are here for a security debriefing. This debriefing is required by government regulation and stipulated in the National.
Reporting Requirements for School Staff Presented by Nancy Hungerford November 30, 2011 Presented by Nancy Hungerford November 30, 2011.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
ANNUAL REFRESHER Industrial Security Briefing LAST UPDATED: FEBRUARY 2013.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Ethical And Legal Considerations Ethical Issues  Ethical codes are not set in stone. They serve as principles upon which to guide practice.  There are.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters Air Force FOIA Exemptions Brief Della Macias HAF/IMII.
PERFORMING ON CLASSIFIED CONTRACTS.
Area Agency on Aging for North Florida, Inc. Case Manager Training June 22 – 23, 2010.
 What is conflict of interest and how can it be avoided  What factors should be considered when determining a “ fair wage “
Unit 2 Human Rights Part 3 Civil and Human Rights.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Information Assurance / Information Security / Network Security What High School Counselors Should Know Ken Crockett Director, Critical Infrastructures.
JACK AMRHEIN NSA ADJUDICATIONS
OVERVIEW Definitions and Air Force Policy Possible Domestic Violence Indicators Rules of Engagement Referral Agencies.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Shaping healthcare … for you and your family Philip Tremewan, Designated Nurse for Safeguarding Adults Guildford & Waverley CCG Safeguarding Adults & Mental.
Accountability Presented by Mollie Schaffer August 13 th, 2014.
ANNUAL REFRESHER Industrial Security Briefing LAST UPDATED: JANUARY 2013.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
P2S-HR-EMP-001 Workplace Substance Abuse for Employees1 Employee Training Drug Free Workplace Extracted from information provided by the Office of the.
Employee Training: Requirements for Mandatory Reporting of Child Abuse, Child Neglect, and Sexual Offenses on School Premises Involving Students
KUMC EXPORT CONTROLS The Challenge: Balancing National Security and Openness in Research, Education and Public Service.
Georgia’s New and Improved PDMP. Greg Reybold, J.D. VP Public Policy & Association Counsel Georgia Pharmacy Association.
Insider Threat Awareness
Personnel Security. Personnel Security Investigation -Personnel Security Investigation is an inquiry into the character, reputation, Discretion, integrity,
NISPOM Basics What You Need to Know!
INSIDER THREAT AWARENESS
ANNUAL REFRESHER BRIEFING AUGUST 2016.
Initial Security Indoctrination
“What is Adverse Information”?
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
Connections Abuse Prevention Plan 2018.
CEA®: The Computer Employment Application
Presentation transcript:

Cleared Employee Reporting Requirements

Reporting Regulations  Defense Security Service (DSS)  The National Industrial Security Program Operating Manual(NISPOM)1-300  Industrial Security Letter(ISL )

Facility Changes  Key Management Personnel(KMP) Change  Address change  Change in Company Stock Holdings  Safeguarding no longer needed

Change in Personal Status  If you have a collateral CONFIDENTIAL, SECRET, or TOP SECRET clearance, you must report:  Name Change;  Change in marital status or cohabitation; Special requirements may apply if intended spouse or partner is a foreign national  Change in citizenship; cannot hold dual citizenship  when access to classified information is no longer required due to a change in job assignments.  Note that if you have access to Sensitive Compartmented Information (SCI) or Special Access Programs (SAPs), you must report other changes in personal status including family deaths and births, change of address, and inheritances.

Foreign Travel  Report foreign travel plans to ERC FSO for business or pleasure  Antiterrorism briefing when supporting a government contract  Additional requirements for SCI and SAP  Department of State briefs on specific countries

Suspicious Contacts You must report:  Any efforts by any individual, regardless of nationality, to obtain illegal or unauthorized access to classified information or to compromise any cleared employee;  Any contact by a cleared employee with known or suspected intelligence officers from any country;  Any contact which suggests you or another employee may be the target of an attempted exploitation by the intelligence services of another country.

Representing a Foreign Interest  You must report when you begin to act as a representative of or consultant to any foreign entity, including a government, a government agency, a commercial business, or a person.

Espionage, Sabotage, Subversive Activities  You must immediately report any situation related to actual, probable, or possible espionage, sabotage, or subversive activities directed at the United States.

Security Violations/Vulnerabilities  You must report any known or suspected security violation or vulnerability of which you become aware, independent of who is responsible or at fault for the situation.

Security Violations/Vulnerabilities include:  Careless or unintentional failure to comply with security requirements for safeguarding classified information;  Intentional disregard of security requirements;  Failure to comply with security requirements, regardless of intent, that has resulted in the loss, compromise, or suspected compromise of classified information;  Unauthorized receipt of classified material;  Significant vulnerabilities discovered in equipment or systems designed to protect classified information.

Adverse Information  Adverse information is any information that adversely reflects on the integrity or character of a cleared employee, which suggests that his/her ability to safeguard classified information may be impaired, or that his/her access to classified information clearly may not be in the interests of national security. You must report the following types of information about yourself or other employees:

13 Adjudicative Guidelines to Report?  Allegiance to the United States  Foreign Influence  Foreign Preference  Sexual Behavior  Personal Conduct  Financial Considerations  Alcohol Consumption  Drug Involvement  Psychological Conditions  Criminal Conduct  Handling Protected Information  Outside Activities  Misuse of Information Technology Systems

Allegiance to the United States  An individual must be of unquestioned allegiance to the U.S.  The willingness to safeguard classified information is in doubt if there is any reason to suspect an individual's allegiance to the U.S.  Any act of sabotage, espionage, treason, terrorism, or sedition against the U.S.

Foreign Influence  Foreign contacts and interests may be a security concern due to divided loyalties or foreign financial interests,  Manipulated or induced to help a foreign person, group, organization, or government in a way that is not in U.S. interests, or is vulnerable to pressure or coercion by any foreign interest.  May be prone to provide information or make decisions that are harmful to the interests of the United States.  Family member, business associate, friend of foreign country might exploit, manipulate, pressure, or coerces.

Foreign Preference  When an individual acts in such a way as to indicate a preference for a foreign country over the United States, then he or she may be prone to provide information or make decisions that are harmful to the interests of the United States.

Sexual Behavior  Sexual behavior that involves a criminal offense  Indicates a personality or emotional disorder  Reflects lack of judgment or discretion  May subject the individual to undue influence or coercion, exploitation, or duress  Can raise questions about an individual's reliability, trustworthiness and ability to protect classified information. the basis of the sexual orientation of the individual.

Personal Conduct  Conduct involving questionable judgment, lack of candor, dishonesty, or unwillingness to comply with rules and regulations can raise questions about an individual's reliability, trustworthiness and ability to protect classified information.  Of special interest is any failure to provide truthful and candid answers during the security clearance process or any other failure to cooperate with the security clearance process

Financial Considerations  Failure or inability to live within one's means, satisfy debts, and meet financial obligations may indicate poor self-control, lack of judgment, or unwillingness to abide by rules and regulations, all of which can raise questions about an individual's reliability, trustworthiness and ability to protect classified information.  An individual who is financially overextended is at risk of having to engage in illegal acts to generate funds.  Compulsive gambling is a concern as it may lead to financial crimes including espionage.  Affluence that cannot be explained by known sources of income is also a security concern. It may indicate proceeds from financially profitable criminal acts.  Wage garnishments.

Alcohol Consumption  Excessive alcohol consumption often leads to the exercise of questionable judgment or the failure to control impulses, and can raise questions about an individual's reliability and trustworthiness.  DUI, fighting, child or spouse abuse, disturbing the peace  Reporting to work intoxicated or drinking on the job  Loose lips, sink ships!

Drug Involvement  Use of an illegal drug  Misuse of a prescription  Individual's reliability and trustworthiness  Person's ability or willingness to comply with laws, rules, and regulations.

Psychological Conditions  Certain emotional, mental, and personality conditions can impair judgment, reliability, or trustworthiness.  A formal diagnosis of a disorder is not required for there to be a concern under this guideline.  No negative implication concerning may be raised solely on the basis of seeking mental health counseling.

Criminal Conduct  Criminal activity creates doubt about a person's judgment, reliability and trustworthiness.  By its very nature, it calls into question a person's ability or willingness to comply with laws, rules and regulations.  Report anytime that you are arrested to your security officer

Handling Protected Information  Deliberate or negligent failure to comply with rules and regulations for protecting classified or other sensitive information raises doubt about an individual's trustworthiness, judgment, reliability, or willingness and ability to safeguard such information, and is a serious security concern.  Includes Sensitive But Unclassified(SBU), For Official Use Only(FOUO), Export Control and International Traffic and Arms Regulations(ITAR), Controlled Unclassified Information(CUI)

Outside Activities  Involvement in certain types of outside employment or activities is of security concern if it poses a conflict of interest with an individual's security responsibilities and could create an increased risk of unauthorized disclosure of classified information.

Misuse of Information Technology  Noncompliance with rules, procedures, guidelines or regulations pertaining to information technology systems may raise security concerns about an individual's reliability and trustworthiness, calling into question the willingness or ability to properly protect sensitive systems, networks, and information.  Information Technology Systems include all related computer hardware, software, firmware, and data used for the communication, transmission, processing, manipulation, storage, or protection of information.

Court Cases  Two court cases  Becker vs. Philco  Taglia vs. Philco  Protect you from reporting on someone else.

The Defense Hotline The DoD maintains a hotline to provide an unconstrained avenue for employees to report, without fear of reprisal, known or suspected instances of serious security irregularities concerning government contracts, programs, or projects. Security recommends that the hotline number be used only when an employee feels that reporting a matter to ERC Security would not be prudent. The Defense Hotline numbers are (800) or (703) In most instances, however, reports of suspected incidents of espionage/sabotage or serious security violations should be made to your local Security organization at the numbers listed above.

Other HOTLINE Numbers  Federal Bureau of Investigation The FBI has 56 field offices. The phone number of the nearest office is listed under United States Government in your local phone book.  Air Force Office of Special Investigations (202)  Department of Commerce/Office of Export Enforcement (202) or (to report suspicious targeting of US export-controlled commodities)  NASA Security Hot Line: NASA Security Operations Center (SOC)

Who to Contact  ERC Facility Security Officer  Sean R DOyle  